Analysis

  • max time kernel
    168s
  • max time network
    137s
  • platform
    windows7_x64
  • resource
    win7-en-20211208
  • submitted
    11/02/2022, 06:28

General

  • Target

    db3ae704e4ea31b79ad7859acfdd0f2c876aaecac3182af2cd64d9108c2d8525.exe

  • Size

    54KB

  • MD5

    5a5e32203cf8eee1b7e9125b1c97ed94

  • SHA1

    7cd7f7d35abb1bd79cc85db99ff3238ea28c3ef4

  • SHA256

    db3ae704e4ea31b79ad7859acfdd0f2c876aaecac3182af2cd64d9108c2d8525

  • SHA512

    3fe266ff6ed79eef7a5e857d167833bd3b03cda165298066acc9afbf0641d533083c281a07775e2017e5659ba1343daf721e9fdc81021052ca93ed1b5f0cd941

Malware Config

Signatures

  • GlobeImposter

    GlobeImposter is a ransomware first seen in 2017.

  • Modifies extensions of user files 8 IoCs

    Ransomware generally changes the extension on encrypted files.

  • Reads user/profile data of web browsers 2 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Adds Run key to start application 2 TTPs 2 IoCs
  • Drops desktop.ini file(s) 26 IoCs
  • Suspicious behavior: EnumeratesProcesses 1 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\db3ae704e4ea31b79ad7859acfdd0f2c876aaecac3182af2cd64d9108c2d8525.exe
    "C:\Users\Admin\AppData\Local\Temp\db3ae704e4ea31b79ad7859acfdd0f2c876aaecac3182af2cd64d9108c2d8525.exe"
    1⤵
    • Modifies extensions of user files
    • Adds Run key to start application
    • Drops desktop.ini file(s)
    • Suspicious behavior: EnumeratesProcesses
    PID:880

Network

MITRE ATT&CK Enterprise v6

Replay Monitor

Loading Replay Monitor...

Downloads

  • memory/880-55-0x0000000075B11000-0x0000000075B13000-memory.dmp

    Filesize

    8KB